On the 16th of July, at around 8pm UTC+2, a malicious AUR package was uploaded to the AUR. Two other malicious packages were uploaded by the same user a few hours later. These packages were installing a script coming from the same GitHub repository that was identified as a Remote Access Trojan (RAT).

The affected malicious packages are:

  • librewolf-fix-bin
  • firefox-patch-bin
  • zen-browser-patched-bin

The Arch Linux team addressed the issue as soon as they became aware of the situation. As of today, 18th of July, at around 6pm UTC+2, the offending packages have been deleted from the AUR.

We strongly encourage users that may have installed one of these packages to remove them from their system and to take the necessary measures in order to ensure they were not compromised.

Follow up

There are more packages with this malware found.

  • minecraft-cracked
  • ttf-ms-fonts-all
  • vesktop-bin-patched
  • ttf-all-ms-fonts

What to do

If you installed any of these packages, check your running processes for one named systemd-initd (this is the RAT).

The suspicious packages have a patch from this now-inaccessible Codeberg repo: https://codeberg.org/arch_lover3/browser-patch

The Arch maintainers have been informed of all this already and are investigating.

    • caseyweederman@lemmy.ca
      link
      fedilink
      arrow-up
      14
      arrow-down
      1
      ·
      9 hours ago

      Half the posts on the Internet are people replying to requests for help with the message “read the wiki, the aur isn’t a trusted source, dummy”

    • copygirl@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      87
      arrow-down
      2
      ·
      edit-2
      14 hours ago

      most of the the Arch cult forget to mention that

      The “Arch cult’s” holy book, the ArchWiki, states the following pretty clearly:

      Warning: AUR packages are user-produced content. These PKGBUILDs are completely unofficial and have not been thoroughly vetted. Any use of the provided files is at your own risk.

      Mention of one’s use of the AUR for their needs doesn’t need to come with a disclaimer.
      People who don’t read or don’t use their brain are going to keep not doing so, regardless.

    • slackness@lemmy.ml
      link
      fedilink
      arrow-up
      8
      arrow-down
      15
      ·
      15 hours ago

      At the very least aur must verify you are associated with the domain name of the project, same as flathub.

      • cole@lemdro.id
        link
        fedilink
        English
        arrow-up
        23
        arrow-down
        1
        ·
        11 hours ago

        that would literally defeat the entire purpose of the AUR

        • slackness@lemmy.ml
          link
          fedilink
          arrow-up
          1
          arrow-down
          7
          ·
          8 hours ago

          flathub still allows unverified submissions which is what I proposed. So, no, it wouldn’t.

          • aksdb@lemmy.world
            link
            fedilink
            arrow-up
            11
            arrow-down
            1
            ·
            7 hours ago

            AUR is the place for unverified submissions. The verified stuff typically ends up in the main repos.

              • juipeltje@lemmy.world
                link
                fedilink
                arrow-up
                4
                ·
                edit-2
                4 hours ago

                It is. Aur isn’t even officially supported by arch. You use it at your own risk, with the advantage being that pretty much everything is in it.